Visible War: Information War, Surveillance and Speed
Liking and hyperlinking: Community detection in online child exploitation networks
‘Questions about Dawlah. DM me, plz.’ The Sock Puppet Problem in Online Terrorism Research
#IS_Fangirl: Exploring a New Role for Women in Terrorism
Abstract: In this paper we present initial results from an ongoing study of women affiliated with pro-IS networks on Twitter and other social media. Our particular focus is on 20 – …
Comment le jihadisme est-il devenu numérique ? Évolutions, tendances et ripostes,
Abstract: Twitter constitue un terrain de jeu de prédilection pour le groupe État islamique (EI) : espace de médiatisation, de revendication et de mobilisation. Depuis sa matrice de naissance afghane – …
Toward a Framework Understanding of Online Programs for Countering Violent Extremism
Abstract: There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means – …
Voices of the Caucasus Emirate: Mapping and analyzing North Caucasus insurgency websites.
Abstract: This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that – …
‘Just Being Mean to Somebody Isn’t a Police Matter’: Police Perspectives on Policing Cyber-bullying
Abstract: Increasing public awareness of cyberbullying, coupled with several highly publicized youth suicides linked to electronic bullying, have led lawmakers and politicians to consider new criminal legislation specifically related to – …
Spreading the message digitally: A look into extremist organizations’ use of the Internet
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups – …
TSAS WP16-05: Assessment of the state of knowledge: Connections between research on the social psychology of the Internet and violent extremism
This paper seeks to answer the question: How does social psychology contribute to our understanding of the link between the Internet and violent extremism?
Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the Cyberbanging Phenomenon
Framing the Online Women’s Movements in the Arab world
Cyber Warriors in the Middle East: The Case of the Syrian Electronic Army
This paper investigates the online hacking group, the Syrian Electronic Army (SEA), and examines its goals. (Source: Publication).
The Social Network of Hackers
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical – …
The Proliferation of Cyber Security Strategies and Their Implications for Privacy
The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …
New Terrorism and New Media
This report examines how Al-Qaeda, its affiliates and other terrorist organizations have moved their online presence to YouTube, Twitter, Facebook, Instagram and other social media outlets, posing challenges to counter-terrorism – …
Voices of the ‘‘Caucasus Emirate’’: Mapping and Analyzing North Caucasus Insurgency Websites
This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. (Source: Publication).
TSAS WP14-01: Researching Terrorism and Counter-Terrorism through a Network Lens
In this paper, we argue that integrating network concepts and network methods to the study of terrorism and counter-terrorism are central ingredients in bringing the field forward from theoretical, empirical, – …
Radicalization – A Guide for the Perplexed
The RCMP, National Security Criminal Investigations Program provides an introduction to terrorist radicalization in Canada, the challenges and how it’s being addressed.
Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor
It is now widely understood that extremists use the internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the terrorism and Extremism – …
FBI, Here I am!
Informing (In)Stability: The Security Implications of a Shifting News and Media Environment
This 60-page booklet contains highlights from the February 21-22 2012 conference that was held by the Canadian Security Intelligence Service in collaboration with Policy Horizons Canada.
‘Bomb-Making for Beginners’: Inside al Al-Qaeda E-Learning Course
This study explores how terrorists utilise the Internet to learn bomb-making skills. Unlike previous studies, it does not focus on assessing the quality of online bomb recipes. (Source: Publication).
